id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
RHSA-2006:0191
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
CVE-2024-10406
SourceCodester Petrol Pump Management Software edit_fuel.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_fuel.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:petrol_pump_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2024-1720
The User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Display Name' parameter in all versions up to, and including, 3.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires social engineering to successfully exploit, and the impact would be very limited due to the attacker requiring a user to login as the user with the injected payload for execution.
[]
null
4.7
null
null
null
CVE-2025-1531
Authentication credentials leakage vulnerability in Hitachi Ops Center Analyzer viewpoint OVF
Authentication credentials leakage vulnerability in Hitachi Ops Center Analyzer viewpoint.This issue affects Hitachi Ops Center Analyzer viewpoint: from 10.0.0-00 before 11.0.4-00.
[]
null
6.5
null
null
null
GHSA-q676-r7fv-jgcc
The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
RHSA-2008:0555
Red Hat Security Advisory: java-1.4.2-ibm security update
Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
null
GHSA-8477-3v39-ggpm
Improper Validation of Integrity Check Value in Bouncy Castle
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.
[]
null
4.4
null
null
null
GHSA-rjw8-v7rr-r563
October System module has a Reflected XSS via X-October-Request-Handler Header
ImpactThe X-October-Request-Handler Header does not sanitize the AJAX handler name and allows unescaped HTML to be reflected back. There is no impact since this vulnerability cannot be exploited through normal browser interactions. This unescaped value is only detectable when using a proxy interception tool.PatchesThis issue has been patched in v3.5.15.ReferencesCredits to:[Mayank Mehra](mailto:[email protected])For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
null
3.1
null
null
null
GHSA-vgp9-2q73-rhh4
Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allows remote attackers to cause a denial of service (application freeze) "by sending invalid posts".
[]
null
null
null
null
null
CVE-2018-13696
The mintToken function of a smart contract implementation for RedTicket, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:redticket_project:redticket:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2024-1755
NPS computy <= 2.7.5 - Results Deletion via CSRF
The NPS computy WordPress plugin through 2.7.5 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
[ "cpe:2.3:a:nps:computy:2.7.5:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-67f2-j5vg-639w
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
[]
null
9.8
null
null
null
GHSA-ch5f-5368-9hw8
If a long user name is used in a username/password combination in a site URL (such as " http://UserName:[email protected]"), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service. This vulnerability affects Firefox < 55.
[]
null
null
7.5
null
null
CVE-2010-0072
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a buffer overflow in observiced.exe that allows remote attackers to execute arbitrary code via vectors related to a "reverse lookup of connections" to TCP port 10000.
[ "cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-pr49-5hhf-6mm6
Directory Traversal in serverabc
Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
null
null
7.5
null
null
GHSA-rhp6-27r4-xwgx
Cross-site scripting (XSS) vulnerability in form_header.php in MyMarket 1.71 allows remote attackers to inject arbitrary web script or HTML via the noticemsg parameter.
[]
null
null
null
null
null
CVE-2013-3493
XnView 2.03 has an integer overflow vulnerability
[ "cpe:2.3:a:xnview:xnview:2.03:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2019-6156
In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected.
[ "cpe:2.3:o:lenovo:510-15ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:510-15ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:510s-08ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:510s-08ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_300-20ish_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_300-20ish:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_300s-11ish_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_300s-11ish:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510-15icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510-15icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510a-15icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510a-15icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510s-08ish_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510s-08ish:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_620s-03ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_620s-03ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_700:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_720-18icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_720-18icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_c530-19icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_c530-19icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_c730-19ico_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_c730-19ico:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t530-28icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t530-28icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t730-28ico_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t730-28ico:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y520t_z370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y520t_z370:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y720_tower_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y720_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y920_tower_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y920_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:lenovo_63_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:lenovo_63:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:h50-30g_desktop_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:h50-30g_desktop:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:m4500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:m4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:m4500_id_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:m4500_id:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:m4550_id_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:m4550_id:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:530s-07icb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:530s-07icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_4500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_b4550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_b4550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_b4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_b4650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_m4550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_m4550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_m4600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_m4600:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_m4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_m4650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_m410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_m410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_b415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_b415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_m415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_m415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e73_\\(sff\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e73_\\(sff\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e73_\\(twr\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e73_\\(twr\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e73s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e73s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e74_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e74:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e74s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e74s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e75t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e75t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e75s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e75s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e93_\\(sff\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e93_\\(sff\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e93_\\(twr\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e93_\\(twr\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m4500k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m4500k:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m4500q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m4500q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m4500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m4500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m4500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m4500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m4600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m4600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m4600s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m4600s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m610:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6500t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6500s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m700q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m700q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m73_\\(sff\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m73_\\(sff\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m73_\\(twr\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m73_\\(twr\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m73_tiny_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m73_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m73p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m73p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m800:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m83_\\(sff\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m83_\\(sff\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m83_\\(tiny\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m83_\\(tiny\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m83_\\(twr\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m83_\\(twr\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8500t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8500s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8600t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8600s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8600s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m900:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m93_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m93:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m93p_\\(sff\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m93p_\\(sff\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m93p_\\(twr\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m93p_\\(twr\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m93p_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m93p_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_s510_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_s510:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v520s-08ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v520s-08ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v520t-15ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v520t-15ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_afh110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_afh110:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_afh81_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_afh81:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_afq150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_afq150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_mc_h110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_mc_h110:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_mc_h110_pci_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_mc_h110_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_mc_h81_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_mc_h81:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_me\\/we_h110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_me\\/we_h110:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_mf\\/wf_h110_pci_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_mf\\/wf_h110_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_mf\\/wf_h81_pci_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_mf\\/wf_h81_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_ms\\/ws_h81_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_ms\\/ws_h81:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_tc\\/wc_h110_pci_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_tc\\/wc_h110_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_tc\\/wcc_h81_pci_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_tc\\/wcc_h81_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_ytm6900e-00_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_ytm6900e-00:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yta8900f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yta8900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio_910-27ish_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio_910-27ish:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio_y910-27ish_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio_y910-27ish:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio300-23isu\\(c5130\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio300-23isu\\(c5130\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio520-22ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio520-22ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio520-22iku_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio520-22iku:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio520-24ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio520-24ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio520-24iku_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio520-24iku:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:aio520-27ikl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:aio520-27ikl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_520s-23iku_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_520s-23iku:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_730s-24ikb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_730s-24ikb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_a7400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_a7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcenter_m700z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcenter_m700z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcenter_m800z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcenter_m800z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e74z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e74z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e95z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e95z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e96z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e96z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m700z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m700z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m7300z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m7300z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m800z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m800z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m810z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m810z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m818z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m818z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m820z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m820z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8300z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8300z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8350z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8350z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m83z_\\(aio\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m83z_\\(aio\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m900z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m900z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m9500z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m9500z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m9550z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m9550z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_x1_aio_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_x1_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v310z\\(yt_s3150\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v310z\\(yt_s3150\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v410z\\(yt_s4250\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v410z\\(yt_s4250\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v510z_\\(yt_s5250\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v510z_\\(yt_s5250\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-22icb\\(yt_s4350\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-22icb\\(yt_s4350\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-24icb\\(yt_s5350\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-24icb\\(yt_s5350\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:330-14igm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:330-14igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:330-15igm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:330-15igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e570p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e570p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e560p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e560p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t460p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t460p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x380_yoga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_c30_refresh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_c30_refresh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_d30_refresh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_d30_refresh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_e32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_e32:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p300:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p310:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p318_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p318:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p500:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p510_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p510:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p700:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p710:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p720:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p900:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p910:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_s30_refresh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_s30_refresh:-:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
null
CVE-2019-9545
An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero.
[ "cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2024-38769
WordPress Arconix Shortcodes plugin <= 2.1.11 - Broken Access Control vulnerability
Missing Authorization vulnerability in Tyche Softwares Arconix Shortcodes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Arconix Shortcodes: from n/a through 2.1.11.
[ "cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
GHSA-9w42-v5mm-2ffh
The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.
[]
null
null
null
null
null
GHSA-9x7h-25gj-xmfj
Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
[]
null
null
null
null
null
CVE-1999-0821
FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument.
[ "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-g536-q3gw-6p2p
Siri in Apple iOS before 9.3.2 does not block data detectors within results in the lock-screen state, which allows physically proximate attackers to obtain sensitive contact and photo information via unspecified vectors.
[]
null
null
2.4
null
null
GHSA-vqv6-r48r-39m7
Unspecified vulnerability in the OPMN component in Oracle Application Server 10.1.2.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a format string vulnerability that allows remote attackers to execute arbitrary code via format string specifiers in an HTTP POST URI, which are not properly handled when logging to opmn/logs/opmn.log.
[]
null
null
null
null
null
CVE-2022-26840
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:quartus_prime:*:*:*:*:standard:*:*:*", "cpe:2.3:a:intel:quartus_prime:*:*:*:*:pro:*:*:*" ]
null
7.3
null
null
null
CVE-2017-6752
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) 9.3(3) and 9.6(2) could allow an unauthenticated, remote attacker to determine valid usernames. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. An attacker could exploit the vulnerability by performing a username enumeration attack to the IP address of the device. An exploit could allow the attacker to determine valid usernames. Cisco Bug IDs: CSCvd47888.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-3w4c-hqgp-9fj3
Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. User interaction is required for exploitation, as a victim must visit a malicious link or input data into a vulnerable web application.
[]
null
5.4
null
null
null
RHSA-2023:5627
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference kernel: LoadPin bypass via dm-verity table reload kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: use-after-free due to race condition in qdisc_graft() kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: hash collisions in the IPv6 connection lookup table kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
null
RHSA-2018:1451
Red Hat Security Advisory: eap6-jboss-ec2-eap security update
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
8.1
null
null
CVE-2024-48547
Incorrect access control in the firmware update and download processes of DreamCatcher Life v1.8.7 allows attackers to access sensitive information by analyzing the code and data within the APK file.
[ "cpe:2.3:o:dreamcatcher_iot_technology:dreamcatcher_life_firmware:1.8.7:*:*:*:*:*:*:*" ]
null
8.4
null
null
null
CVE-2016-3100
kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file.
[ "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_frameworks:*:*:*:*:*:*:*:*" ]
null
null
8.4
2.1
null
GHSA-hh78-whh3-vp4q
Cuyahoga before 1.0.1 installs the FCKEditor component with an incorrect deny statement in a Web.config file, which allows remote attackers to upload files when these privileges were intended only for the Administrator and Editor roles.
[]
null
null
null
null
null
GHSA-2c9m-w3h6-q5pr
Dell Pair Installer version prior to 1.2.1 contains an elevation of privilege vulnerability. A low privilege user with local access to the system could potentially exploit this vulnerability to delete arbitrary files and result in Denial of Service.
[]
null
6.6
null
null
null
CVE-2020-3940
VMware Workspace ONE SDK and dependent mobile application updates address sensitive information disclosure vulnerability.
[ "cpe:2.3:a:vmware:workspace_one_boxer:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_content:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_content:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:vmware:workspace_one_intelligent_hub:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_notebook:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_people:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_piv-d_manager:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_sdk:*:*:*:*:*:xamarin:*:*", "cpe:2.3:a:vmware:workspace_one_sdk:*:*:*:*:*:apache_cordova:*:*", "cpe:2.3:a:vmware:workspace_one_sdk:*:*:*:*:*:android:*:*", "cpe:2.3:a:vmware:workspace_one_sdk_\\(objective-c\\):*:*:*:*:iphone_os:*:*:*", "cpe:2.3:a:vmware:workspace_one_web:*:*:*:*:*:android:*:*" ]
null
5.9
null
4.3
null
CVE-2022-37437
Ingest Actions UI in Splunk Enterprise 9.0.0 disabled TLS certificate validation
When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions.
[ "cpe:2.3:a:splunk:splunk:9.0.0:*:*:*:enterprise:*:*:*" ]
null
7.4
null
null
null
GHSA-r94j-7j3g-wg4f
Heap buffer overflow in Vulkan in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)
[]
null
8.8
null
null
null
CVE-2016-8566
An issue was discovered in Siemens SICAM PAS before 8.00. Because of Storing Passwords in a Recoverable Format, an authenticated local attacker with certain privileges could possibly reconstruct the passwords of users for accessing the database.
[ "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-h3j9-g643-p927
IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
[]
null
null
null
null
null
GHSA-c264-rp8f-rf64
The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
[]
null
null
7.8
null
null
GHSA-wf5c-vj9m-vm9w
The Kazakhstan Radio (aka com.wordbox.kazakhstanRadio) application 2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-5rj5-5628-7w5m
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges.
[]
null
7.8
null
null
null
CVE-2024-31251
WordPress Community by PeepSo plugin <= 6.3.1.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo.This issue affects Community by PeepSo: from n/a through 6.3.1.1.
[]
null
4.3
null
null
null
GHSA-9qpj-59m6-fgwh
In Ant Design Pro 4.0.0, reflected XSS in the user/login redirect GET parameter affects the authorization component, leading to execution of JavaScript code in the login after-action script.
[]
null
6.1
null
null
null
GHSA-p3jm-9qcf-m97r
D-Link DAP-2622 DDP Set SSID List PSK Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20101.
[]
null
null
8.8
null
null
GHSA-7rjm-hcwm-8qgg
Mozilla 1.0 allows remote attackers to steal cookies from other domains via a javascript: URL with a leading "//" and ending in a newline, which causes the host/path check to fail.
[]
null
null
null
null
null
GHSA-4r6h-8v6p-xvw6
Prototype Pollution in sheetJS
All versions of SheetJS CE through 0.19.2 are vulnerable to "Prototype Pollution" when reading specially crafted files. Workflows that do not read arbitrary files (for example, exporting data to spreadsheet files) are unaffected.A non-vulnerable version cannot be found via npm, as the repository hosted on GitHub and the npm package `xlsx` are no longer maintained.
[]
null
7.8
null
null
null
GHSA-jwjr-63x8-g58w
A local attacker could read files from some other users' SA360 reports stored in the /tmp folder during staging process before the files are loaded in BigQuery. We recommend upgrading to version 1.0.3 or above.
[]
null
5.5
null
null
null
GHSA-5h6m-fg6x-4p4v
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.
[]
null
5.5
null
null
null
CVE-2019-13980
In Directus 7 API through 2.3.0, uploading of PHP files is blocked only when the Apache HTTP Server is used, leading to uploads/_/originals remote code execution with nginx.
[ "cpe:2.3:a:rangerstudio:directus_7_api:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2024-24327
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pppoePass parameter in the setIpv6Cfg function.
[ "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-9c8w-jrw3-q2c3
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with &#00058 as the replacement for the : character.
[]
null
6.1
null
null
null
RHSA-2017:1658
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update
openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation openssl: OCSP Status Request extension unbounded memory growth SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
7.5
null
null
GHSA-hr85-6c3j-3cpx
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.
[]
null
null
null
null
null
CVE-2020-17075
Windows USO Core Worker Elevation of Privilege Vulnerability
Windows USO Core Worker Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
RHBA-2020:2477
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
jenkins: CSRF protection bypass via crafted URLs jenkins: XSS in job configuration pages jenkins: Content-Security-Policy headers for files uploaded leads to XSS jenkins: improperly processes HTML content of list leads to XSS
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
5.4
null
null
null
GHSA-6gh5-794v-v6mc
Information leak vulnerability in the Agent Handler of McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 allows an unauthenticated user to download McAfee product packages (specifically McAfee Agent) available in ePO repository and install them on their own machines to have it managed and then in turn get policy details from the ePO server. This can only happen when the ePO Agent Handler is installed in a Demilitarized Zone (DMZ) to service machines not connected to the network through a VPN.
[]
null
6.5
null
null
null
CVE-2021-31468
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D files embedded in PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13620.
[ "cpe:2.3:a:foxitsoftware:3d:*:*:*:*:*:foxit_reader:*:*", "cpe:2.3:a:foxitsoftware:3d:*:*:*:*:*:phantompdf:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-m62g-7v8j-3fwc
app/Controller/UserLoginProfilesController.php in MISP before 2.4.198 does not prevent an org admin from viewing sensitive login fields of another org admin in the same org.
[]
null
9.8
null
null
null
GHSA-3ghc-cw76-h292
Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
8.8
null
null
null
ICSA-19-330-02
ABB Relion 650 and 670 Series
An attacker may use a specially crafted message to force the device to reboot, which could cause a denial of service.CVE-2019-18247 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
5.3
null
null
GHSA-m6f4-gmx3-wr5w
In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955.
[]
null
6.5
null
null
null
CVE-2023-29415
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A denial of service (process hang) can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
[ "cpe:2.3:a:bzip3_project:bzip3:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2024-54929
KASHIPARA E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_subject.php.
[ "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
RHSA-2019:0415
Red Hat Security Advisory: kernel security and bug fix update
kernel: MIDI driver race condition leads to a double-free
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
null
GHSA-5fp7-mmwq-gvmw
In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.
[]
null
7.5
null
null
null
CVE-2024-51937
WordPress IA Map Analytics Basic plugin <= 20170413 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Information Analytics IA Map Analytics Basic allows DOM-Based XSS.This issue affects IA Map Analytics Basic: from n/a through 20170413.
[]
null
6.5
null
null
null
CVE-2017-1516
IBM Doors Web Access 9.5 and 9.6 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 129826.
[ "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-8wfw-j7w7-xqj3
OpenVAS Manager 3.0 before 3.0.7 and 4.0 before 4.0.4 allows remote attackers to bypass the OMP authentication restrictions and execute OMP commands via a crafted OMP request for version information, which causes the state to be set to CLIENT_AUTHENTIC, as demonstrated by the omp_xml_handle_end_element function in omp.c.
[]
null
null
null
null
null
CVE-2013-6655
Use-after-free vulnerability in Blink, as used in Google Chrome before 33.0.1750.117, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper handling of overflowchanged DOM events during interaction between JavaScript and layout.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-21612
Cross-site Scripting in TabberTransclude in Extension:TabberNeue
TabberNeue is a MediaWiki extension that allows the wiki to create tabs. Prior to 2.7.2, TabberTransclude.php doesn't escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here. This vulnerability is fixed in 2.7.2.
[]
null
8.6
null
null
null
CVE-2022-36582
An arbitrary file upload vulnerability in the component /php_action/createProduct.php of Garage Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
[ "cpe:2.3:a:garage_management_system_project:garage_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-xrvc-5f74-4x4x
The CLUEVO LMS, E-Learning Platform WordPress plugin before 1.8.1 does not sanitise and escape Course's module, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[]
null
null
null
null
null
GHSA-q299-h828-h44m
Cisco WebEx Meeting Center does not properly determine authorization for reading a host calendar, which allows remote attackers to obtain sensitive information by obtaining a list of all meetings and then sending a calendar request for each one, aka Bug ID CSCur23913.
[]
null
null
null
null
null
CVE-2009-1502
Directory traversal vulnerability in plugin.php in S-Cms 1.1 Stable and 1.5.2 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the page parameter.
[ "cpe:2.3:a:matteoiammarrone:s-cms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:matteoiammarrone:s-cms:1.5.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-gv38-5q2v-rvgw
Vulnerability in the Oracle Order Management component of Oracle E-Business Suite (subcomponent: Product Diagnostic Tools). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Order Management executes to compromise Oracle Order Management. Successful attacks of this vulnerability can result in takeover of Oracle Order Management. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7
null
null
GHSA-6627-jcx5-j2g8
Java Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.18.00.
[]
null
7.5
null
null
null
GHSA-qr9x-j6hh-jw37
TEMMOKU T1.09 Beta allows admin/user/add CSRF.
[]
null
null
8.8
null
null
CVE-2020-24198
A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.'
[ "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-v9wg-49f7-4f43
The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.
[]
null
null
null
null
null
GHSA-c6fr-x99h-2jv7
FTPService.exe in Blackmoon FTP 3.1 Build 1735 and Build 1736 (3.1.7.1736), and possibly other versions before 3.1.8.1737, allows remote attackers to cause a denial of service (crash) via a large number of PORT commands with long arguments, which triggers a NULL pointer dereference. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2024-23240
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
2.4
null
null
null
GHSA-97p9-r285-2g4p
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Maksym Marko Website price calculator allows SQL Injection.This issue affects Website price calculator: from n/a through 4.1.
[]
null
8.5
null
null
null
GHSA-3c29-2h4x-fgg4
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker.
[]
null
6.1
null
null
null
cisco-sa-dncm-xss-AvMyAwd2
Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dncm-xss-AvMyAwd2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dncm-xss-AvMyAwd2"]
[]
null
null
4.8
null
null
GHSA-qwg9-mmfv-xg7j
In multiple locations, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
8.4
null
null
null
GHSA-jxwj-qccf-4896
Jenkins IFTTT Build Notifier Plugin vulnerability exposes IFTTT Maker Channel Keys
Jenkins IFTTT Build Notifier Plugin 1.2 and earlier stores IFTTT Maker Channel Keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.These keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.As of publication of this advisory, there is no fix.
[]
null
4.3
null
null
null
GHSA-wc9v-xvxc-2x5v
Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.
[]
null
7.8
null
null
null
CVE-2019-6773
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
GHSA-362v-m99f-grr8
In onCreate of InstallStart.java, there is a possible package validation bypass due to a time-of-check time-of-use vulnerability. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.0 Android ID: A-140195904
[]
null
6.7
null
null
null
CVE-2023-4427
Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-qwp4-jq8v-wpq4
XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at Xfpx!gffGetFormatInfo+0x0000000000028508."
[]
null
null
7.8
null
null
CVE-2024-27388
SUNRPC: fix some memleaks in gssx_dec_option_array
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix some memleaks in gssx_dec_option_array The creds and oa->data need to be freed in the error-handling paths after their allocation. So this patch add these deallocations in the corresponding paths.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-qh23-548p-jvf7
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
[]
null
null
null
null
null
CVE-2024-45109
Photoshop Desktop | Out-of-bounds Write (CWE-787)
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2012-6349
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x before 8.5.3 FP4, allows remote attackers to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
[ "cpe:2.3:a:autonomy:keyview_idol:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.3:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2025-32854
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockOpcSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
[]
8.7
8.8
null
null
null
GHSA-whfj-p5r5-33pr
Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.
[]
null
6.5
null
null
null
CVE-2016-1000121
XSS and SQLi in Huge IT Joomla Slider v1.0.9 extension
[ "cpe:2.3:a:huge-it:slider:1.0.9:*:*:*:*:joomla:*:*" ]
null
null
4.8
3.5
null
GHSA-cxx4-w85r-9fxh
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0901.
[]
null
null
5.5
null
null